Linking pages
- Data exfiltration from Writer.com with indirect prompt injection https://promptarmor.substack.com/p/data-exfiltration-from-writercom 97 comments
- How does AI fail ? - by Thierry Decroix https://int3.substack.com/p/how-does-ai-fail 1 comment
- Adversarial machine learning explained: How attackers disrupt AI and ML systems | CSO Online https://www.csoonline.com/article/3664748/adversarial-machine-learning-explained-how-attackers-disrupt-ai-and-ml-systems.html 0 comments
- How to start Penetration testing of Artificial Intelligence | by Taimur Ijlal | InfoSec Write-ups https://infosecwriteups.com/how-to-start-penetration-testing-of-artificial-intelligence-c11e97b77dfa 0 comments
- GitHub - jiep/offensive-ai-compilation: A curated list of useful resources that cover Offensive AI. https://github.com/jiep/offensive-ai-compilation 0 comments
- Securing generative AI: An introduction to the Generative AI Security Scoping Matrix | AWS Security Blog https://aws.amazon.com/blogs/security/securing-generative-ai-an-introduction-to-the-generative-ai-security-scoping-matrix/ 0 comments
- A Primer on LLM Security â Hacking Large Language Models for Beginners https://kleiber.me/blog/2024/03/17/llm-security-primer/ 0 comments
Related searches:
Search whole site: site:atlas.mitre.org
Search title: MITRE | ATLAS™
See how to search.